General

  • Target

    2024-05-17_1ec7d259b3934b78d318b598a809a20c_cryptolocker

  • Size

    39KB

  • MD5

    1ec7d259b3934b78d318b598a809a20c

  • SHA1

    7e3f0d53d6dfb642a06f88a304d3ea93d60e6a44

  • SHA256

    1488f2594f72ca6a25926b6c74ed1f990b8cac479ca1982f4fefdf5f41bcb53b

  • SHA512

    bb5d28ea21aa3176607c3c022d3bf6c3e800ac728d263082803bccf5017391357617e06a7644d83ffa823fdfef0b33dfc42cc98f41afabe79b2f29b6c4484279

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaBAw:qDdFJy3QMOtEvwDpjjWMl7Tdz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-17_1ec7d259b3934b78d318b598a809a20c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections